User Privilege Policy
The risk potential of running user-initiated tasks using the same access levels as components of the operating system is staggeringly high, particularly in an age where ransomware can traverse networks, encrypting files in demand of payment. Privilege levels can mitigate potential damage posed by external threats, internal malicious actors and simple operator error.
This policy from TechRepublic Premium provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for the usage of high-privilege or administrator accounts.
Featured text from the policy:
Where possible, use sudo or “Run As…” to temporarily escalate privileges rather than create an account to perform a task.
Sharing of accounts is prohibited.
Creation of duplicate personal privileged accounts is prohibited.
Ensure you have logged out when finishing a task. Do not walk away from a device logged in using a superuser account, leaving it unsecured.
Strengthen your handling of user privileges with our five-page policy document. Previously priced at $49, this is now available for download at just $9. Alternatively, enjoy complimentary access with a Premium annual subscription. Click here to find out more.
TIME SAVED: Crafting this content required 10 hours of dedicated writing, editing and research.
Resource Details
* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.
* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.